Loading...
Loading...
Reverse-engineer a product into a mechanically verifiable feature catalog + code map + specs using an RPI-style loop. Triggers: reverse engineer product, catalog full feature set, docs->code mapping, feature inventory, code map, “Ralph loop”, SaaS boundary mapping, security audit reverse engineering, authorized binary analysis.
npx skill4agent add boshu2/agentops reverse-engineer-rpipython3 skills/reverse-engineer-rpi/scripts/reverse_engineer_rpi.py ao \
--authorized \
--mode=binary \
--binary-path="$(command -v ao)" \
--output-dir=".agents/research/ao/"python3 skills/reverse-engineer-rpi/scripts/reverse_engineer_rpi.py cc-sdd \
--mode=repo \
--upstream-repo="https://github.com/gotalab/cc-sdd.git" \
--output-dir=".agents/research/cc-sdd/"product_name--docs-sitemap-urlhttps://...file:///...--docs-features-prefixdocs/features/--upstream-repo--local-clone-dir.tmp/<product_name>--output-dir.agents/research/<product_name>/--modebinaryrepo|binary|both--binary-path--modebinary--no-materialize-archives--security-audit--sbom--fuzz--authorizedpython3 skills/reverse-engineer-rpi/scripts/reverse_engineer_rpi.py <product_name> --authorized [flags...]output_dir/.agents/council/.agents/learnings/output_dir/feature-inventory.mdfeature-registry.yamlvalidate-feature-registry.pyfeature-catalog.mdspec-architecture.mdspec-code-map.mdspec-cli-surface.mdspec-code-map.mdspec-clone-vs-use.mdspec-clone-mvp.mdbinary-analysis.mdbinary-embedded-archives.md--security-auditoutput_dir/security/threat-model.mdattack-surface.mddataflow.mdcrypto-review.mdauthn-authz.mdfindings.mdreproducibility.mdvalidate-security-audit.shbash skills/reverse-engineer-rpi/scripts/self_test.shvalidate-security-audit.sh